Abstract - Nested certificates are proposed as certificates for other, subject, certificates. However, any malicious modification over the subject certificate cannot be located by the verification of it via a nested certificate. This integrity control problem can be solved by employing one way hash functions. In this paper, two integrity control methods for the subject certificate verification are described. Their relative advantages and disadvantages are also discussed.
Paper in PDF (72K)
Back to Albert Levi's home page
Back to M. Ufuk Caglayan's home page